Secure multi-party computation: theory, practice and applications C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan Information Sciences 476, 357-372, 2019 | 453 | 2019 |
Forward private searchable symmetric encryption with optimized I/O efficiency X Song, C Dong, D Yuan, Q Xu, M Zhao IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018 | 180 | 2018 |
Blockchain-based fair payment smart contract for public cloud storage auditing H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo Information Sciences 519, 348-362, 2020 | 170 | 2020 |
Rational protocols and attacks in blockchain system T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang Security and Communication Networks 2020 (1), 8839047, 2020 | 82 | 2020 |
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao Soft Computing 21, 7325-7335, 2017 | 57 | 2017 |
Randomness invalidates criminal smart contracts Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao Information Sciences 477, 291-301, 2019 | 55 | 2019 |
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions Z Liu, KKR Choo, M Zhao Computers & Security 69, 97-113, 2017 | 48 | 2017 |
Secure computation protocols under asymmetric scenarios in enterprise information system Y Wang, M Zhao, Y Hu, Y Gao, X Cui Enterprise Information Systems 15 (4), 492-512, 2021 | 29 | 2021 |
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang, ASV Koe Information Sciences 601, 1-17, 2022 | 25 | 2022 |
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage C Hu, Y Xu, P Liu, J Yu, S Guo, M Zhao Information Sciences 520, 15-30, 2020 | 25 | 2020 |
Memory-efficient transformer-based network model for traveling salesman problem H Yang, M Zhao, L Yuan, Y Yu, Z Li, M Gu Neural Networks 161, 589-597, 2023 | 23 | 2023 |
Label‐only membership inference attacks on machine unlearning without dependence of posteriors Z Lu, H Liang, M Zhao, Q Lv, T Liang, Y Wang International Journal of Intelligent Systems 37 (11), 9424-9441, 2022 | 19 | 2022 |
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems Y Wang, Z Wang, G Yang, S Ai, X Xiang, C Chen, M Zhao Digital Communications and Networks 9 (5), 1053-1060, 2023 | 17 | 2023 |
Efficient and secure outsourced approximate pattern matching protocol X Wei, M Zhao, Q Xu Soft Computing 22, 1175-1187, 2018 | 17 | 2018 |
Multi-user searchable encryption with a designated server Z Li, M Zhao, H Jiang, Q Xu Annals of Telecommunications 72, 617-629, 2017 | 17 | 2017 |
An ORAM-based privacy preserving data sharing scheme for cloud storage D Yuan, X Song, Q Xu, M Zhao, X Wei, H Wang, H Jiang Journal of information security and applications 39, 1-9, 2018 | 15 | 2018 |
Cut-and-choose bilateral oblivious transfer and its application C Zhao, H Jiang, X Wei, Q Xu, M Zhao 2015 IEEE Trustcom/BigDataSE/ISPA 1, 384-391, 2015 | 13 | 2015 |
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial M Zhao, C Hu, X Song, C Zhao Journal of Network and Computer Applications 131, 55-65, 2019 | 12 | 2019 |
Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis Y Zhang, M Zhao, T Li, Y Wang, T Liang Information Sciences 625, 299-313, 2023 | 11 | 2023 |
Keyword guessing on multi-user searchable encryption Z Li, M Zhao, H Jiang, Q Xu International Journal of High Performance Computing and Networking 14 (1), 60-68, 2019 | 11 | 2019 |